Static task
static1
Behavioral task
behavioral1
Sample
a39731297634694c4814e11589b231e7_JaffaCakes118.exe
Resource
win7-20240729-en
General
-
Target
a39731297634694c4814e11589b231e7_JaffaCakes118
-
Size
3.1MB
-
MD5
a39731297634694c4814e11589b231e7
-
SHA1
8cc68325ab66c4bbb3000c7a0315e87dba66012c
-
SHA256
f206ffbac896d78f95e0a83757bc4de17769607238c556f07580c8936035bbe4
-
SHA512
79f05acccf5b55272a9cf57d4a676d62ed1bbc1c32796f2f9a87b406740c0b5fda7246d3060d1b6f28edae6c18058a90f56533a1de2d87d15d5fa57a95978c70
-
SSDEEP
49152:oXePCceH/twPKdKS+ceLvXShSrmHHgJB/JOCplNJIZUW/K//VT5PxWmdnIwyg1gz:oPceExonwPX8UwEVThx777WVgVWN
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a39731297634694c4814e11589b231e7_JaffaCakes118
Files
-
a39731297634694c4814e11589b231e7_JaffaCakes118.exe windows:4 windows x86 arch:x86
98a302f6bbeb0a006f303a0b09de7e12
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
version
VerQueryValueA
GetFileVersionInfoSizeA
GetFileVersionInfoA
shell32
SHBrowseForFolderA
ShellExecuteA
SHGetMalloc
SHGetPathFromIDListA
ShellExecuteExA
comctl32
ord17
kernel32
DuplicateHandle
GetCurrentProcess
ExitProcess
Sleep
RemoveDirectoryA
DeleteFileA
WaitForSingleObject
CreateProcessA
lstrcpyA
GetWindowsDirectoryA
SetErrorMode
GetTempPathA
ExpandEnvironmentStringsA
lstrcmpA
lstrcmpiA
GetTickCount
GetExitCodeThread
CreateThread
CopyFileA
InterlockedIncrement
InterlockedDecrement
QueryPerformanceFrequency
CreateEventA
lstrcatA
GetTempFileNameA
CompareStringA
CompareStringW
GetVersionExA
SetFilePointer
SetFileAttributesA
SetFileTime
LocalFileTimeToFileTime
DosDateTimeToFileTime
FreeLibrary
GetProcAddress
LoadLibraryA
LockResource
LoadResource
SizeofResource
FindResourceA
GetExitCodeProcess
ExitThread
GetCommandLineA
GetSystemDefaultLCID
GlobalHandle
VerLanguageNameA
GetLocalTime
FormatMessageA
LocalFree
SetCurrentDirectoryA
FindClose
FindNextFileA
CompareFileTime
FindFirstFileA
GetSystemTimeAsFileTime
GetSystemInfo
MulDiv
IsValidCodePage
GetVersion
GetCurrentDirectoryA
GetFileSize
FileTimeToLocalFileTime
GetFileTime
FlushFileBuffers
SetEndOfFile
GetDiskFreeSpaceA
GetDriveTypeA
CreateDirectoryA
GetThreadContext
GetLocaleInfoA
GetACP
GetCPInfo
SetUnhandledExceptionFilter
LCMapStringW
LCMapStringA
IsBadWritePtr
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetEnvironmentVariableA
TlsGetValue
TlsAlloc
TlsSetValue
GetCurrentThreadId
HeapSize
GetStartupInfoA
HeapReAlloc
RaiseException
RtlUnwind
LeaveCriticalSection
DeleteCriticalSection
InterlockedExchange
InitializeCriticalSection
EnterCriticalSection
SystemTimeToFileTime
QueryPerformanceCounter
ResetEvent
SetEvent
GetShortPathNameA
VirtualProtect
VirtualQuery
GetFileType
GetModuleHandleA
TerminateProcess
SearchPathA
IsBadReadPtr
IsBadCodePtr
GetStringTypeA
GetStringTypeW
SetStdHandle
GlobalAlloc
CloseHandle
GlobalLock
ReadFile
GlobalUnlock
GlobalFree
VirtualProtectEx
WriteProcessMemory
GetOEMCP
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
FlushInstructionCache
SetThreadContext
ResumeThread
GetFileAttributesA
GetProcessHeap
HeapAlloc
HeapFree
WriteFile
lstrcpynA
GetModuleFileNameA
lstrlenW
WideCharToMultiByte
MultiByteToWideChar
GetLastError
SetLastError
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
lstrlenA
GetCurrentThread
CreateFileA
GetStdHandle
GetSystemDirectoryA
user32
DrawIcon
DestroyIcon
GetDlgCtrlID
FillRect
GetSysColor
GetSysColorBrush
GetSystemMetrics
SetRect
FindWindowA
IntersectRect
SubtractRect
GetWindowPlacement
MoveWindow
GetWindowTextA
GetWindowTextLengthA
GetParent
GetDlgItemTextA
GetWindow
SetCursor
UpdateWindow
GetClassInfoA
CreateDialogParamA
CharNextA
wvsprintfA
EnableWindow
MessageBoxA
SetWindowTextA
GetWindowRect
ScreenToClient
IsWindow
DestroyWindow
WaitForInputIdle
GetWindowLongA
BeginPaint
EndPaint
SetWindowLongA
GetClientRect
ClientToScreen
SetWindowPos
GetWindowDC
EndDialog
GetDlgItem
ShowWindow
DialogBoxParamA
GetDesktopWindow
wsprintfA
MsgWaitForMultipleObjects
PeekMessageA
DefWindowProcA
PostMessageA
KillTimer
PostQuitMessage
SetTimer
LoadIconA
LoadCursorA
RegisterClassA
CreateWindowExA
GetMessageA
TranslateMessage
DispatchMessageA
GetDC
ReleaseDC
LoadStringA
CharPrevA
ExitWindowsEx
SendDlgItemMessageA
IsDialogMessageA
CharUpperA
CharLowerBuffA
SendMessageA
gdi32
GetTextExtentPoint32A
SetBkMode
SetTextColor
GetObjectA
CreateFontIndirectA
CreateSolidBrush
CreateCompatibleDC
SelectObject
CreateFontA
DeleteDC
DeleteObject
GetStockObject
GetSystemPaletteEntries
CreatePalette
GetDeviceCaps
SelectPalette
RealizePalette
CreateDIBitmap
BitBlt
TranslateCharsetInfo
advapi32
RegQueryValueA
RegCloseKey
RegOpenKeyExA
RegSetValueExA
RegCreateKeyExA
RegDeleteValueA
RegEnumValueA
RegOpenKeyA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
FreeSid
EqualSid
AllocateAndInitializeSid
GetTokenInformation
OpenThreadToken
RegQueryValueExA
rpcrt4
UuidCreate
UuidToStringA
RpcStringFreeA
ole32
StgIsStorageFile
StgOpenStorage
CoUninitialize
CoInitialize
oleaut32
VariantClear
SysAllocStringLen
SysReAllocStringLen
SysStringLen
SysAllocString
SysFreeString
VariantChangeType
Sections
.text Size: 252KB - Virtual size: 251KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 32KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 24KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 124KB - Virtual size: 124KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE